Files
CVEs-PoC/2021/CVE-2021-34430.md
2025-09-29 21:09:30 +02:00

18 lines
772 B
Markdown

### [CVE-2021-34430](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34430)
![](https://img.shields.io/static/v1?label=Product&message=Eclipse%20TinyDTLS&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=unspecified%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-338%3A%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)&color=brightgreen)
### Description
Eclipse TinyDTLS through 0.9-rc1 relies on the rand function in the C library, which makes it easier for remote attackers to compute the master key and then decrypt DTLS traffic.
### POC
#### Reference
- https://bugs.eclipse.org/bugs/show_bug.cgi?id=568803
#### Github
No PoCs found on GitHub currently.